Cisco Wireless LAN Controller および Aironet Access Point における認証に関する脆弱性
| Title |
Cisco Wireless LAN Controller および Aironet Access Point における認証に関する脆弱性
|
| Summary |
Cisco Wireless LAN Controller (WLC) および Aironet Access Point には、認証に関する脆弱性が存在します。 ベンダは、本脆弱性を Bug ID CSCvc79502 および CSCvf71789 として公開しています。
|
| Possible impacts |
情報を改ざんされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
May 2, 2018, midnight |
| Registration Date |
June 29, 2018, 5:44 p.m. |
| Last Update |
June 29, 2018, 5:44 p.m. |
|
CVSS3.0 : 警告
|
| Score |
4.7
|
| Vector |
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N |
|
CVSS2.0 : 注意
|
| Score |
3.3
|
| Vector |
AV:A/AC:L/Au:N/C:N/I:P/A:N |
Affected System
| シスコシステムズ |
|
Cisco Aironet アクセス ポイント ソフトウェア
|
|
Cisco Wireless LAN Controller ソフトウェア
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年06月29日] 掲載 |
June 29, 2018, 5:44 p.m. |
NVD Vulnerability Information
CVE-2018-0247
| Summary |
A vulnerability in Web Authentication (WebAuth) clients for the Cisco Wireless LAN Controller (WLC) and Aironet Access Points running Cisco IOS Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic. The vulnerability is due to incorrect implementation of authentication for WebAuth clients in a specific configuration. An attacker could exploit this vulnerability by sending traffic to local network resources without having gone through authentication. A successful exploit could allow the attacker to bypass authentication and pass traffic. This affects Cisco Aironet Access Points running Cisco IOS Software and Cisco Wireless LAN Controller (WLC) releases prior to 8.5.110.0 for the following specific WLC configuration only: (1) The Access Point (AP) is configured in FlexConnect Mode with NAT. (2) The WLAN is configured for central switching, meaning the client is being assigned a unique IP address. (3) The AP is configured with a Split Tunnel access control list (ACL) for access to local network resources, meaning the AP is doing the NAT on the connection. (4) The client is using WebAuth. This vulnerability does not apply to .1x clients in the same configuration. Cisco Bug IDs: CSCvc79502, CSCvf71789.
|
| Publication Date |
May 3, 2018, 7:29 a.m. |
| Registration Date |
March 1, 2021, 6:36 p.m. |
| Last Update |
Nov. 21, 2024, 12:37 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:wireless_lan_controller_software:8.3\(104.105\):*:*:*:*:*:*:* |
|
|
|
|
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:cisco:aironet_access_point_software:8.3\(104.105\):*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:o:cisco:aironet_access_point_software:8.5\(107.52\):*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List